Legend Magazine (November 017) Current Affairs and Quiz, Computer, Aptitude, Banking Awareness Exclusively prepared for race students Issue



Yüklə 1,78 Mb.
səhifə13/13
tarix30.12.2018
ölçüsü1,78 Mb.
#88178
1   ...   5   6   7   8   9   10   11   12   13

Answer Key:

1. (b) 2. (a) 3. (d) 4. (d) 5. (b) 6. (a) 7. (b) 8. (a) 9. (b) 10. (a) 11. (a) 12. (d) 13. (a) 14. (c) 15. (d) 16. (a) 17. (c) 18. (a) 19. (d) 20. (c) 21. (b) 22. (c) 23. (a) 24. (a) 25. (b) 26. (c) 27. (b) 28. (c) 29. (d) 30. (a) 31. (b) 32. (d) 33. (a) 34. (a) 35. (d) 36. (e) 37. (c) 38. (a) 39. (b) 40. (c) 41. (a) 42. (b) 43. (d) 44. (b) 45. (b) 46. (a) 47. (a) 48. (b) 49. (c) 50. (a) 51. (b) 52. (a) 53. (c) 54. (b) 55. (b) 56. (a) 57. (c) 58. (b) 59. (a) 60. (c) 61. (e) 62. (a) 63. (b) 64. (c) 65. (b) 66. (a) 67. (e) 68. (d) 69. (e) 70. (d) 71. (d) 72. (d) 73. (a) 74. (c) 75. (b) 76. (c) 77. (c) 78. (a) 79. (e) 80. (c) 81. (a) 82. (b) 83. (c) 84. (a) 85. (a) 86. (c) 87. (a) 88. (c) 89. (b) 90. (a) 91. (c) 92. (a) 93. (d) 94. (e) 95. (d) 96. (b) 97. (c) 98. (a) 99. (c) 100. (e) 101. (d) 102. (c) 103. (d) 104. (e) 105. (c) 106. (c) 107. (d) 108. (c) 109. (a) 110. (b) 111. (d) 112. (e) 113. (a) 114. (a) 115. (e) 116. (b) 117. (a) 118. (d) 119. (c) 120. (b) 121. (a) 122. (c) 123. (c) 124. (d) 125. (b) 126. (d) 127. (a) 128. (a) 129. (e) 130. (e) 131. (a) 132. (a) 133. (c) 134. (a) 135. (c) 136. (b) 137. (d) 138. (a) 139. (a) 140. (a) 141. (c) 142. (e) 143. (a) 144. (b) 145. (a) 146. (a) 147. (d) 148. (e) 149. (a) 150. (b) 151. (a) 152. (c) 153. (d) 154. (a) 155. (a) 156. (b) 157. (c) 158. (d) 159. (a) 160. (d) 161. (c) 162. (d) 163. (c) 164. (b) 165. (a) 166. (c) 167. (b) 168. (c) 169. (b) 170. (b) 171. (e) 172. (a) 173. (c) 174. (a) 175. (b) 176. (a) 177. (a) 178. (c) 179. (d) 180. (c) 181. (b) 182. (d) 183. (e) 184. (c) 185. (b) 186. (c) 187. (a) 188. (d) 189. (a) 190. (b) 191. (c) 192. (d) 193. (e) 194. (c) 195. (e) 196. (c) 197. (a) 198. (d) 199. (b) 200. (c) 201. (b) 202. (e) 203. (a) 204. (c) 205. (a) 206. (b) 207. (b) 208. (a) 209. (c) 210. (b) 211. (a) 212. (b) 213. (c) 214. (b) 215. (a) 216. (b) 217. (a) 218. (b) 219. (b) 220. (c) 221. (c) 222. (c) 223. (b) 224. (b) 225. (a) 226. (c) 227. (b) 228. (c) 229. (c) 230. (e) 231. (b) 232. (d) 233. (c) 234. (d) 235. (c) 236. (c) 237. (e) 238. (a) 239. (a) 240. (d) 241. (d) 242. (b) 243. (c) 244. (c) 245. (b) 246. (d) 247. (c) 248. (c) 249. (d) 250. (c)



Computer:

Q.1) What is the shortcut key to close the active window?

a) CTRL+W b) CTRL+F10

c) CTRL+F4 d) Both a & c

e) none of the above

Q.2) What is the shortcut key to open Font dialog box?

a) CTRL + R b) CTRL+D c) CTRL+B

d) CTRL+G e) CTRL+Q

Q.3) Primary memory stores?

a) data b) program c) result

d) all the above e) none of these

Q.4) A program that is used to view websites is called a:

a) spread sheet b) word document

c) web viewer d) browser

e) viewer

Q.5) Which of the following is not an input device?

a) mouse b) keyboard c) monitor

d) joystick e) touch screen

Q.6) The Internet began with the development of

a) USENET b) ARPANET c) Ethernet

d) Intranet e) None of these

Q.7) In slide layout panel, how many layouts are available for text layout by default?

a) 1 b) 2 c) 3

d) 4 e) 5

Q.8) The first microprocessor was developed by whom?

a) IBM b) Intel c) Pentium

d) dell e) none of these

Q.9) IPV4 address is

a) 8 bits b) 16 bits c) 32 bits

d) 64 bits e) 128 bits

Q.10) What does BSOD stand for?

a) blue screen of death

b) blur screen of death

c) blue screen of dual

d) blur screen of dual

e) none of these

Q.11) What is the name of the first general purpose electronic computer?

a) UNIVAC b) ENIAC c) EDSAC

d) EDVAC e) none of these

Q.12) To move from one worksheets to another in MS-Excel workbook one should click

a) active cell b) scroll bar

c) sheet tab d) windows button

e) status bar

Q.13) The sixth layer in the OSI model is

a) network b) session

c) transport d) application

e) presentation

Q.14) Who is the father of Internet?

a) Vint Cerf b) Tim Berners Lee

c) Martin Cooper d) Bill Gates

e) Mark Zuckerberg

Q.15) A small amount of time is allocated for the processing simultaneously is

a) single user OS b) multi user OS

c) real time OS d) multi tasking OS

e) time sharing OS

Q.16) The portion that shows all the choices you can make while working in a window is called the

a) options b) table

c) menu bar d) task bar e) item bar

Q.17) The computer understandable language is also known as

a) machine language

b) machine code

c) object code

d) all the above

e) none of these

Q.18) .in is the domain name for

a) jobs b) organization

c) name d) commercial business

e) India


Q.19) In relational database, a field is a

a) label b) table of information

c) related records d) category of information

e) none of these

Q.20) The network IP addresses ranging from 192.0.0.0 to 223.0.0.0 is

a) class A b) class B c) class C

d) class D e) class E

Q.21) Who invented the Difference Engine?

a) J ohn naiper b) Blaise pascal

c) Charles babbage d) Herman Hollerith

e) none of these

Q.22) Which of the following involves creating a single cell by combining two or more selected cells?

a) combining b) merging

c) splitting d) formating

e) transferring

Q.23) The address given to a computer connected to a network is

a) IP address b) server address

c) client address d) source address

e) destination address

Q.24) Which of the following is an electronic or paper log used to track computer activity?

a) cookie b) firewall

c) keylogger d) spyware e) audit trial

Q.25) To execute a given DOS program, you must type a(n)

a) command b) order

c) syntax d) number

e) none of these

Q.26) The space between the margin and the text is

a) line spacing b) paragraph spacing

c) indent d) all the above

e) none of these

Q.27) A directory within a directory is

a) double directory

b) mini directory

c) nested directory

d) in directory

e) sub directory

Q.28) The creation of Internet Protocol(IP) packets with a forged source IP address, with the purpose of concealing the identity of the sender or impersonating another computer system is

a) smishing b) phishing

c) hacking d) spoofing

e) pharming

Q.29) The second layer in OSI model is _________

a) Physical layer b) Data link layer

c) Transport layer d) Network layer

e) Session layer

Q.30) Which of the following shortcut key is used to repeat the last action performed?

a) F3 b) F4 c) F5

d) F6 e) F7

Q.31) Abacus was developed in which country?

a) India b) Japan c) China

d) USA e) France

Q.32) Zoom in & out button is available in

a) home tab b) insert tab c) review tab

d) view tab e) references tab

Q.33) Bits are packaged into frames at which layer of the OSI model?

a) network layer b) physical layer

c) data link layer d) application layer

e) session layer

Q.34) An online discussion group that allows direct live communication is

a) email b) hyperlink

c) ISP d) web crawler

e) chat group

Q.35) Which program is used to interprets commands given by the user?

a) fork b) function

c) kernel d) shell

e) all the above

Q.36) Routers operate at which layer of the OSI model?

a) physical layer b) network layer

c) data link layer d) session layer

e) application layer

Q.37) Employee(ID, name, dept name, sal) : in this query which attribute form the primary key?

a) name b) dept name

c) ID d) sal

e) all the above

Q.38) Which of the following output device display information from the computer on to a large white screen?

a) Monitor b) Screen image projector

c) Printer d) Data projector

e) both b & d

Q.39) Junk email is also called

a) cookies b) buffer

c) spam d) spoof e) shell

Q.40) What is the base of the decimal number system?

a) 10 b) 5 c) 16

d) 8 e) 2

Q.41) IC stands for

a) Internal circuit

b) Information circuit

c) Integrated circuit

d) Input circuit

e) None of these

Q.42) Which of the following shortcut key is used to justify a paragraph?

a) Ctrl+I b) Ctrl+B

c) Ctrl+C d) Ctrl+V e) Ctrl+J

Q.43) Computer’s BIOS is stored in

a) RAM b) ROM c) SRAM

d) DRAM e) Hard disk

Q.44) Which device is used to convert digital into analog form at the sending end and back to digital signals from analog form at the receiving end?

a) hub b) gateway c) NIC

d) modem e) bridge

Q.45) Trackball is an example for a

a) pointing device b) output device

c) software device d) printing device

e) programming device

Q.46) A virus that creates a new file with same existing file name is

a) Macro virus b) virus hoax

c) computer prank d) Worm

e) companion virus

Q.47) World wide web was invented by whom?

a) Mosaic corporation b) Opera corporation

c) Tim Berners Lee d) Vint cert

e) None of these

Q.48) The Operating system used in the first generation of computers is

a) Multitasking OS b) Real time OS

c) Time sharing OS d) Batch processing OS

e) GUI OS

Q.49) Each device connected to a network is called

a) intranet b) extranet

c) pc d) server

e) node


Q.50) Which OS does not have GUI Interface?

a) Windows 98 b) Windows XP

c) Windows 2000 d) Windows 2007

e) DOS


Q.51) The memory acts as a buffer between the CPU and main memory is

a) RAM b) ROM c) Cache

d) hard disk e) all the above

Q.52) The OS is embedded in a device in the ROM is

a) multi processing OS

b) real time OS

c) embedded OS

d) multiuser OS

e) single user OS

Q.53) The input devices which accepts inputs when the user places a fingertip on the computer screen is

a) plotter b) light pen

c) joystick d) digitizing tablet

e) touch screen

Q.54) Which memory need to be continually refreshing to retain data

a) ROM b) SRAM c) PROM

d) DRAM e) EEPROM

Q.55) Which of the following displays the information includes the current page number, the total number of pages and the number of words in the document, zoom slider etc.?

a) status bar b) scroll bar

c) ruler bar d) work area

e) none of these

Q.56) In which form does the data is stored in the computer

a) Decimal b) Binary

c) HexaDecimal d) Octal

e) Octahedral

Q.57) Which level language is an Assembly language?

a) machine language

b) machine code

c) high – level programming language

d) medium – level programming language

e) low – level programming language

Q.58) .com is the domain name for

a) jobs b) organization

c) name d) commercial business

e) India


Q.59) .in relational database, a field is a

a) label


b) table of information

c) related records

d) category of information

e) none of these

Q.60) The network IP addresses ranging from 192.0.0.0 to 223.0.0.0 is

a) class A b) class B

c) class C d) class D

e) class E

Q.61) The computer which is used for weather forecasting is

a) mainframe b) super computer

c) mini computer d) pc

e) all the above

Q.62) The bar at the bottom of the screen that shows what Ms word is prepared to do next is

a) title bar b) menu bar

c) tool bar d) scroll bar

e) status bar

Q.63) Data compression is done in which layer?

a) presentation b) application

c) network d) session

e) datalink

Q.64) Internet uses

a) Packet switching

b) Circuit switching

c) Digital switching

d) Code switching

e) Telefix switching

Q.65) What is the process of copying software programs from secondary storage media to the hard disk called?

a) Running b) execution

c) installation d) uninstallation

e) optimization

Q.66) Zombie army is also known as

a) keylogger b) rootkit

c) Botnet d) Dos attacks

e) none of these

Q.67) What holds the meta data?

a) data files b) data structures

c) data manager d) data dictionary

e) file manager

Q.68) The measurement of degree of the sharpness of a displayed image is

a) pixel b) dot

c) resolution d) line

e) none of these

Q.69) Which of the following is a cookie that is automatically recreated after being deleted?

a) Zombie Cookie

b) Super Cookie

c) Session Cookie

d) HTTP only Cookie

e) none of these

Q.70) 1YB is equal to

a) 1024 EB b) 1024 PB

c) 1024 TB d) 1024 GB e) 1024 ZB

Q.71) To Paste,press

a) CTRL+W b) CTRL+F10

c) CTRL+F4 d) CTRL+V

e) none of the above

Q.72) To enter a formula in the Excel, we must begin with an operator such as

a) @ b) = c) +

d) $ e) %

Q.73) The half an octet is

a) bit b) byte c) kilobyte

d) nibble e) megabyte

Q.74) 1 Mega Byte is equal to

a) 1024 Bits b) 1024 Bytes

c) 1024 Kilo Bytes d) 1024 Giga Bytes

e) None of these

Q.75) Which of the following is not an output device?

a) mouse b) plotter

c) monitor d) printer

e) projector

Q.76) The Anti-virus which is available free of cost on Internet is

a) avira b) Norton c) Mcfee

d) quick heal e) all the above

Q.77) The best way to insert a new slide in a presentation is to use the

a) normal view b) slide sorter view

c) slide show view d) special view

e) single view

Q.78) Ultra Large Scale Integrated circuit is used in which generation of computer?

a) first b) second c) third

d) fourth e) fifth

Q.79) The method of Internet access that requires phone line, but offers faster access speeds than dial-up is

a) model b) Digital subscriber line (DSL)

c) cable d) satellite access

e) fibre optic

Q.80) Restarting a computer that is already ‘ON’ is known as

a) Booting b) Refreshing c) Restart

d) Warm booting e) Repeating

Q.81) A floppy disk contains

a) circular tracks b) sectors

c) both a & b d) selection

e) none of the above

Q.82) The unit of work for the Operating system is

a) task b) process c) work

d) all the above e) none of these

Q.83) Most of the commonly available Pcs/Laptop have a keyboard popularly known as

a) WSDFR b) ASDFGH c) ZXCVBNM

d) QWERTY e) SDFTHJN

Q.84) Main memory works in conjunction with

a) RAM b) CD c) LAN

d) Graphics card e) CPU

Q.85) The background on which the windows appears is

a) desktop b) start c) icon

d) images e) none of these

Q.86) In DOS which of the following command is used to delete all the files as well as sub-directories of a directory?

a) DELETE b) DEL c) DELTREE

d) MOVE e) DELE

Q.87) The set of instructions which is used to perform a given task is called?

a) data b) information c) program

d) object e) function

Q.88) The collection of tools that are used to obtain administrator-level access to a computer or a network of computers is referred to as?

a) zombie b) computer worm

c) scareware d) rootkit

e) worm


Q.89) The language which enables user to manipulate data is

a) DCL b) DDL c) DML

d) DQL e) all the above

Q.90) Which protocol is used in network layer?

a) IP b) TCP c) FTP

d) SMTP e) HTTP

Q.91) The command used to save a document under a different name is

a) Save b) Save As c) New

d) Different e) None of these

Q.92) Which of the following is a server that saves Web pages that users have requested so that successive requests for these pages do not require the use of the Internet?

a) dedicated server b) virtual server

c) cache server d) all the above

e) none of these

Q.93) The shortcut which is used to insert new slide in powerpoint is

a) Ctrl+M b) Ctrl+N c) Ctrl+E

d) Ctrl+O e) Ctrl+R

Q.94) The decimal equivalent of the binary number 11001101 is

a) 205 b) 206 c) 204

d) 208 e) 201

Q.95) The main characteristic of fourth generation computer was

a) transistor b) microprocessor

c) vacuum tubes d) circuit

e) none of these

Q.96) The cell which we are currently working is known as

a) Default cell b) current cell

c) active cell d) first cell

e) none of these

Q.97) The computer understandable language is also known as

a) machine language

b) machine code

c) object code

d) all the above

d) none of these

Q.98) Which of the following is a cyber-attack intended to redirect a website’s traffic to another, fake site?

a) pharming b) phishing

c) spoofing d) scareware

e) adware

Q.99) Which topology requires the central controller or hub?

a) bus b) star c) mesh

d) ring e) line

Q.100) WAN stands for

a) WAP area network

b) Wired area network

c) Wide area network

d) Wireless area network

e) none of these

Q.101) To delete the selected item, press

a) delete b) shift+delete

c) alt+delete d) ctrl+delete

e) ctrl+alt+delete

Q.102) In SMTP, M stands for

a) many b) management

c) more d) mail

e) none of these

Q.103) Flash drives are plugged into a(n)

a) expansion slot b) serial port

c) USB port d) 3.55 jack

e) drive bay

Q.104) The octal equivalent of decimal number 73 is

a) 89 b) 88 c) 90

d) 91 e) 92

Q.105) The key which is used to delete characters to the left of the cursor is

a) backspace b) delete c) end

d) home e) arrow keys

Q.106) Who gave the definition of computer virus?

a) Charles Babbage

b) John Von Neumann

c) Alan Turing

d) Fred Cohan

e) Poul Allen

Q.107) Image can be sent over telephone lines by using

a) scanner b) fax c) OCR

d) cable e) none of these

Q.108) The IBM super computer is

a) Shasra-T b) Sunway Taihu Light

c) Watson d) Cray-1

e) Param 8000

Q.109) Television is an example for

a) simplex b) half duplex

c) full duplex d) multiplex

e) demultiplex

Q.110) LynxOS is an example for

a) single user OS b) multi user OS

c) multi-processor OS

d) real time OS e) time sharing OS

Q.111) Which of the following does not have flash memory?

a) pen drive b) hard disk

c) memory cards d) memory stick

e) car radio

Q.112) How many OS can be at work in the computer at a time?

a) 1 b) 2 c) 3

d) 4 e) 5

Q.113) An input device that utilizes a light sensitive detector to select objects on a display screen is

a) digitizer b) keyboard

c) light pen d) barcode reader

e) OCR


Q.114) Which of the following is not necessarily required to start the computer?

a) RAM b) motherboard

c) CPU d) flash drives e) OS

Q.115) Computers designed for specialized scientific work and specific instructions are called

a) mainframe b) super computer

c) mini computer d) micro computer

e) all the above

Q.116) Which among the following is a diagnostic testing sequence that a computers basic input/output system runs to determine if the hardware components are working correctly?

a) booting b) BSOD

c) POST d) bootstrap loading

e) none of these

Q.117) A pictorial representation of the sequence of steps and decisions need to perform a process is

a) algorithm b) procedure

c) program d) flow chart

e) software

Q.118) The binary equivalent of hexadecimal number 510 is

a) 111111110 b) 111100111

c) 101010101 d) 111100001

e) 111111100

Q.119) The key in one table that used as a primary key in another table is

a) candidate key b) foreign key

c) super key d) alternate key

e) secondary key

Q.120) Which of the following network devices is also known as concentrator?

a) hub b) bridge

c) switch d) gateway

e) repeater

Q.121) In Ms-word 2007, the option which is used to change page size and margins is

a) home tab b) reference tab

c) insert tab d) page layout tab

e) view tab

Q.122) To copy data from a remote computer/ internet to a local computer is called

a) uploading b) surfing

c) downloading d) browsing

e) none of these

Q.123) In ENIAC, E stands for

a) electrical b) electronic

c) engineering d) equipment

e) none of these

Q.124) The decimal equivalent of binary number 11100111 is

a) 228 b) 235 c) 238

d) 230 e) 231

Q.125) The component of a motherboard which absorbs the heat produced by the CPU and the other components of the computer is

a) CPU socket b) CMOS battery

c) heat sink d) all the above

e) none of these

Q.126) The cell range in Excel is represented by using

a) comma b) colon

c) semi colon d) plus

e) dot


Q.127) The software which allows to do mathematical calculations is

a) word processing software

b) spread sheet software

c) image processing software

d) presentation software

e) browsing software

Q.128) Which of the following spreads from computer to computer through networks?

a) worm b) trojan horse

c) scareware d) virus hoax

e) companion virus

Q.129) Which of the following cable technologies which covert electrical signals into optical signals?

a) co-axial b) twisted pair

c) UTP d) fiber optics

e) none of these

Q.130) The shortcut key to open Save As dialog box, press

a) F3 b) F5 c) F7

d) F10 e) F12

Q.131) Which type of computer could be found in a digital watch?

a) hand held computer

b) tablet c) PC

d) mainframe e) embedded computer

Q.132) The default font type in Ms-word 2007 is

a) verdana b) calibri

c) times new roman

d) all the above e) none of these

Q.133) The small hardware device that joins multiple computers together within one LAN is called:

a) NIC b) bridge c) router

d) gateway e) switch

Q.134) A cookie that can only be transmitted over an encrypted connection is:

a) super cookie b) transient cookie

c) secure cookie d) tracking cookie

e) all the above

Q.135) When a computer is switched on, the booting process performs ______

a) integrity test b) power-on-self test

c) reliability test d) functioning test

e) alpha test

Q.136) A hacker installs malicious code on a personal computer or server misdirecting users to fraudulent Web sites without their knowledge or consent is

a) phishing b) spoofing c) smishing

d) pharming e) all the above

Q.137) Which of the following is the ascending order of data hierarchy?

a) Bit, Byte, Field, Record

b) Field, Byte, Bit, Record

c) Bit, Byte, Record, Field

d) Field, Bit, Byte, Record

e) Byte, Bit, Record, Field

Q.138) The key that makes characters either upper or lowercase and numbers to symbols is

a) icon b) ctrl key c) shift key

d) mouse e) joystick

Q.139) Which of the following is the valid domain name extension?

a) .edu b) .org c) .com

d) .gov e) all the above

Q.140) The binary equivalent of decimal number 147 is

a) 1100110 b) 1101110

c) 1011110 d) 1111101

e) 1110001

Q.141) NOS is

a) Node operating system

b) Non-open software

c) Network Operating system

d) Non-operating software

e) None of these

Q.142) ULSI is

a) Ultra Large-Scale Integration

b) Ultimate Large-Scale Integration

c) Upper Large-Scale Integration

d) Ultra Large Script Integration

e) Ultimate Large Script Integration

Q.143) The most frequently used instructions of a computer program are likely to be fetched from

a) hard disk b) RAM c) ROM

d) cache e) all the above

Q.144) Which of the following is a way of storing your favourite websites on the Internet?

a) bookmark b) adware

c) cookies d) spam

e) all the above

Q.145) Ctrl, Shift, Alt are

a) toggle keys b) modifier keys

c) typing keys d) cursor control keys

e) numeric keys

Q.146) The virus that uses computer hosts to reproduce itself is

a) adware b) spyware

c) worm d) time bomb

e) macro virus

Q.147) The shortcut which is used to change the text in Microsoft Word from uppercase to lowercase or a capital letter at the beginning of every word?

a) Shift + F3 b) Shift + F4

c) Shift + F5 d) Shift + F7

e) Shift + F6

Q.148) Which of the following is a large and expensive, computer capable of simultaneously processing data for hundreds or thousands of users?

a) hand held computer

b) PC

c) embedded computer



d) mainframe

e) none of these

Q.149) The fifth Layer in the OSI model is

a) physical layer

b) network layer

c) application layer

d) data link layer

e) session layer

Q.150) UNIX Operating System is used in

a) laptop b) web servers

c) PC d) palmtop

e) tablets

Q.151) A duplicate of a file, program, or disk that you can use in case the original is lost, damaged, or destroyed is

a) backup b) SRAM c) DRAM

d) ROM e) EEPROM

Q.152) The bus that transfer data from one component to another or between computers is

a) control bus b) data bus

c) address bus d) all the above

e) none of these

Q.153) The special type of optical scanner which is used to recognize the type of mark made by Pen or Pencil is

a) MICR b) OCR c) OMR

d) bar code reader e) all the above

Q.154) The part of control unit that holds the instruction currently being processed or executed is

a) memory address register

b) memory data register

c) program counter

d) instruction registers

e) all the above

Q.155) A free software which does not have a copyright owner or license restrictions and the source code is publicly available for anyone to use is

a) shareware b) freeware

c) demo software d) open source software

e) public domain software

Q.156) The first commercially successful version of Windows OS is

a) windows 1.0 b) windows 3.0

c) windows 95 d) windows 98

e) windows 2000

Q.157) The Recycle Bin stores discarded items until

a) You empty it

b) the computer is log off

c) the computer is Shut down

d) Another user logs on

e) all the above

Q.158) A program that performs a useful task while simultaneously allowing destructive acts is:

a) Trojan horse b) virus

c) worm d) macro virus

e) spyware

Q.159) A database that contains tables linked by common fields is called

a) centralised database

b) flat file database

c) relational database

d) hierarchical database

e) network database

Q.160) Encryption and Decryption are the functions of

a) data link layer b) session layer

c) network layer d) transport layer

e) presentation layer

Q.161) Pascaline is also known as

a) abacus

b) adding machine

c) division machine

d) difference machine

e) none of these

Q.162) Storage of e-mails messages is called

a) file b) folder

c) mailbox d) directory

e) hard drive

Q.163) The networking device that reduce the amount of traffic on a LAN by dividing it in to two segments is

a) router b) gateway

c) bridges d) switches

e) hub


Q.164) A host on the Internet finds another host by which of the following address?

a) postal address b) electronic address

c) destination address d) source address

e) IP address

Q.165) Which of the following is an operating system?

a) Unix b) Linux c) Mozilla firefox

d) both a & b e) Google chrome

Q.166) To protect yourself from computer hacker instructions you should install a

a) firewall b) mailer c) macro

d) script e) HTTP

Q.167) A collection of conceptual tools for describing data, relationships, semantics and constrains is referred to as

a) database b) data model c) DBMs

d) RDBMS e) all the above

Q.168) The key which is used in combination with another key to perform a specific task is?

a) space bar b) arrow c) control

d) delete e) page up

Q.169) Which among the following is a search engine?

a) internet explorer b) mozilla firefox

c) google d) flash

e) all the above

Q.170) To convert binary number in to decimal, multiply all binary digits by the power of

a) 2 b) 4 c) 6

d) 8 e) 10

Q.171) The command which is used to permanently delete files or folders is

a) Shift+delete b) Ctrl+Delete

c) Alt+Delete d) Delete

e) Backspace

Q.172) The default extensions of Ms-word 2007 and Ms-Excel 2007 is

a) .doc, .xls b) .doc, .xml

c) .docx, .xlsx d) .txtx, .xlsx

e) .docx, .xmlx

Q.173) Pen drive is also known as

a) flash drive b) thumb drive

c) CD d) DVD

e) both a & b

Q.174) The Internet services that provides a multimedia interface to available resources is called

a) FTP b) IP c) Telnet

d) gopher e) WWW

Q.175) Printer is an example of

a) output device b) input device

c) storage device d) processing device

e) none of these

Q.176) The virus spreads in application software is

a) boot virus b) macro virus

c) anti-virus d) file virus

e) trojan horse

Q.177) The electronics spreadsheet consists of

a) rows b) columns c) cell

d) all the above e) none of these

Q.178) ENIAC is an example for

a) first generation b) second generation

c) third generation d) fourth generation

e) fifth generation

Q.179) Bluetooth is an example for

a) LAN b) WAN c) MAN

d) SAN e) PAN

Q.180) The collection of programs that controls how the computer system runs and processes information is called

a) compiler b) interpreter

c) operating system

d) assembler e) translator

Q.181) The rate at which data is written to a disk or read from the disk is

a) data format rate

b) data transfer rate

c) data sending rate

d) data receiving rate

e) none of these

Q.182) Arrange in descending order the units of memory KB, TB, GB, MB

a) TB>GB>MB>KB

b) GB>TB>KB>MB

c) MB>KB>GB>TB

d) KB>MB>GB>TB

e) MB>GB>TB>KB

Q.183) The smallest unit in an image in a computer screen is

a) pel b) pixel

c) picture element d) all the above

e) none of these

Q.184) The temporary physical storage used to hold data during execution of process from one place to another is

a) socket b) buffer

c) virtual memory d) flash memory

e) none of these

Q.185) The intangible instructions that tell the computer what to do is

a) hardware b) data

c) software d) input

e) output

Q.186) The simultaneously processing of two or more programs by multiple processors is

a) single user

b) time sharing

c) multi programming

d) multi tasking

e) multi processing

Q.187) Date and time are available on the desktop of

a) my computer

b) start menu

c) recycle bin

d) menu bar

e) task bar

Q.188) The first boot sector virus is

a) brain b) creeper

c) ransomware d) time bomb

e) proxy


Q.189) Which of the following types of table constraints will prevent the entry of duplicate rows?

a) primary key b) foreign key

c) null key d) unique key

e) all the above

Q.190) A system that responds to requests across a computer network is

a) client b) server c) network

d) firewall e) router

Q.191) When entering text within a document, the enter key is pressed at the end of the

a) paragraph b) sentence

c) word d) file e) line

Q.192) A HTTP request contains how many parts?

a) 1 part b) 2 parts c) 3 parts

d) 4parts e) 5 parts

Q.193) The shortcut for cut command is

a) Ctrl+W b) Ctrl+X c) Ctrl+Z

d) CTRL+V e) CTRL+C

Q.194) The binary equivalent of decimal number 99 is

a) 1100011 b) 1000111 c) 1110001

d) 1111000 e) 1100111

Q.195) The brain of the computer is

a) CU b) ALU

c) microprocessor d) Input device

e) CPU

Q.196) By default, on which page the header or footer is printed?



a) on first page b) on last page

c) on alternative page d) on every page

e) none of these

Q.197) The primary purpose of the software is to turn data in to

a) information b) classes

c) inheritance d) objects

e) web pages

Q.198) The first computer virus is

a) brain b) creeper

c) wanna cry d) param

e) all the above

Q.199) The network used in phone lines is

a) WAN b) LAN c) WWLAN

d) PAN e) SAN

Q.200) Gb stands for

a) Giga Byte b) Giga bit c) Geop bit

d) Geop Byte e) none of these

Q.201) The number system computer uses to store data and perform calculations.

a) Binary b) octal

c) Decimal d) Hexadecimal

e) None of these

Q.202) The symbol is used in Excel to denote exponential numbers is

a) * b) ^ c) &

d) $ e) None of these

Q.203) Personal computers can be connected together to form a_______.

a) server b) supercomputer

c) network d) enterprise

e) client

Q.204) What's considered the 'backbone' of the World Wide Web?

a) URL b) HTML c) HTTP

d) FTP e) telnet

Q.205) In OCR the word ’C’ stands for

a) Communication

b) character c) cell

d) computer e) none of these

Q.206) Which input device cannot be used to work in MS Office?

a) Scanner b) Mouse c) Keyboard

d) Joy stick d) Light pen

e) all the above

Q.207) The errors that can be pointed out by the compiler known as ______.

a) Syntax errors b) Semantic errors

c) Logic errors d) System errors

e) None of these

Q.208) In MICR, C stands for?

a) Code b) Color c) Computer

d) Character e) None of these

Q.209) Which of the following is used by the browser to connect to the location of the Internet resources?

a) Linkers b) Protocol c) Cable

d) URL e) None of these

Q.210) How many megabytes make a gigabyte ?

a) 1024 b) 128 c) 256

d) 512 e) 64

Q.211) VIRUS stands for________

a) Very Important Record User Searched

b) Verify Interchanged Result Until Source

c) Vital Information Resource Under Seige

d) Very Important Resource Under Search

e) None of these

Q.212) 'FTP‘ stands for_____

a) File Translate Protocol

b) File Transit Protocol

c) File Typing Protocol

d) File Transfer Protocol

e) None of these

Q.213) The programs which are as permanent as hardware and stored in ROM is known as

a) Hardware b) Software

c) Firmware d) ROM ware

e) None of these

Q.214) Which of the following printer do not hit or impact a ribbon to print?

a) daisy wheel b) dot-matrix

c) drum d) ink-jet

e) all the above

Q.215) Which of the following is an impact printer?

a) Page printers b) Laser printers

c) Ink-jet printers d) Dot-matrix printers

e) None of these

Q.216) A network of geographically distant computers and terminals is called

a) Integrated Services Digital Network (ISDN)

b) Wide area network (WAN)

c) Local area network (LAN)

d) Metropolitan area network(MAN)

e) Personal area network(PAN)

Q.217) Setting fonts for the text in your document is an example of:

a) Formatting b) Formulas

c) Tracking changes d) Tools

e) None of these

Q.218) The ALU and Control Unit jointly known as_______

a) RAM b) ROM

c) CPU d) PC

e) none of these

Q.219) The device is used to connect your computer with a telephone line, so that can access information from other servers and ordinary users too, said device is called ___________

a) Modem b) Set Top Box

c) LAN Card d) UPS e) None of these

Q.220) To be able to 'boot', the computer must have a(n) ..........

a) Compiler b) Loader

c) Operating System

d) Assembler e) None of these

Q.221) Instructions and data that are processed by the CPU are located in________

a) CD-ROM b) RAM

c) the hard disk d) the motherboard

e) none of these

Q.222) Which of the following processing is used when a large mail-order company accumulates orders and processes them together in one large set?

a) batch b) online c) real-time

d) embedded e) group

Q.223) Which of the following is not an input device?

a) Mouse b) Keyboard

c) Light pen d) printer

e) scanner

Q.224) A concentric circle on a disk is called a________

a) cylinder b) track c) head

d) sector e) none of these

Q.225) The minimum free space required for running window is

a) 8 MB b) 10 MB c) 16 MB

d) 32 MB e) None of these

Q.226) The commonly used UNIX commands like date, ls, cat etc. are stored in_________

a) dev directory b) bin directory

c) tmp directory d) unix directory

e) None of these

Q.227) Word processing, spreadsheet, and photo-editing are examples of________

a) application software

b) system software

c) operating system software

d) platform software

e) none of these

Q.228) After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered as

a) data b) input c) output

d) process e) storage

Q.229) A table consists of_________

a) Fields and columns

b) Rows and columns

c) Rows and cells

d) All of the above

e) None of these

Q.230) Which type of transmission media is known as regular telephone wire?

a) Wi-Fi

b) Twisted-pair wire

c) Fiber optic cable

d) Coaxial cable

e) None of these

Q.231) Which of the following is the fastest and most expensive computers?

a) Super Computers

b) Quantum Computers

c) Mainframe Computers

d) Micro Computers

e) Mini computers

Q.232) Which of the following is not associated with spread sheet?

a) cell b) formula

c) worksheet d) virus

e) none of these

Q.233) The protocol layer that transfers data between adjacent network nodes in a WAN or between nodes on the same LAN

a) datalink layer b) network layer

c) session layer d) presentation layer

e) application layer

Q.234) The network which is used to connect computer devices which are located within small geographical area like home, office, schools etc. is

a) MAN b) WAN c) LAN

d) SAN e) PAN

Q.235) UNIX Operating System is typically used for

a) client b) web servers

c) mainframe d) Pc

e) none of these

Q.236) Collecting personal information and effectively posing as another individual is known as the crime of _________

a) smishing b) phishing

c) hacking d) pharming

e) identity theft

Q.237) Which of the following is used to store custom data private to the page or application?

a) Data Redundancy b) Data Integrity

c) Data Attribute d) All the above

e) none of these

Q.238) Which of the following is used to read handwritten or printed text to make a digital image that is stored in memory?

a) printer b) laser

c) touch screen d) scanner

e) none of these

Q.239) The automated program that runs over the Internet is

a) bot b) ping c) jitter

d) hub e) all the above

Q.240) The binary equivalent of the decimal number 156 is

a) 11011100 b) 10111100

c) 10011100 d) 11110000

e) 10001100

Q.241) The shortcut key used to insert the current Time is

a) Shift+Alt+T b) Shift+Alt+D

c) Ctrl+Alt+T d) Ctrl+Alt+T

e) Shift+Ctrl+T

Q.242) Which is used to create a soft break instead of a new paragraph?

a) shift+ctrl b) shift+enter

c) shift+alt d) shift+tab

e) ctrl+enter

Q.243) A removable magnetic disk that holds information is

a) monitor b) CPU

c) hard disk d) UPS e) keyboard

Q.244) Which of the following is not a valid domain name extension?

a) .edu b) .org c) .com

d) .net e) .xls

Q.245) The input device which is used to process huge volume of cheques is

a) MICR b) OCR c) OMR

d) barcode reader e) scanner

Q.246) Smishing is also known as

a) SMS phishing

b) SMS vishing

c) SMS pharming

d) SMS spoofing

e) all the above

Q.247) A feature of Word used to transform text into a drawing object is

a) clip art b) word art

c) animation d) font

e) all the above

Q.248) A hybrid computer is a combination of

a) Micro & Mini computers

b) Mini & Super Computers

c) Mainframe & Super Computers

d) Analog & Digital computers

e) Micro & Digital computers

Q.249) The Fifth layer in OSI model is

a) transport layer

b) session layer

c) application layer

d) network layer

e) presentation layer

Q.250) The portion of an OS that is responsible for interacting with the hardware is

a) root b) kernel c) register

d) buffer e) shell

Answer Key:

1. (d) 2. (b) 3. (d) 4. (d) 5. (c) 6. (b) 7. (d) 8. (b) 9. (c) 10. (a) 11. (a) 12. (c) 13. (e) 14. (a) 15. (e) 16. (c) 17. (d) 18. (e) 19. (d) 20. (c) 21. (c) 22. (b) 23. (a) 24. (e) 25. (a) 26. (c) 27. (e) 28. (d) 29. (b) 30. (b) 31. (c) 32. (d) 33. (c) 34. (e) 35. (d) 36. (b) 37. (c) 38. (e) 39. (c) 40. (a) 41. (c) 42. (e) 43. (b) 44. (d) 45. (a) 46. (e) 47. (c) 48. (d) 49. (e) 50. (e) 51. (c) 52. (c) 53. (e) 54. (d) 55. (a) 56. (b) 57. (e) 58. (d) 59. (d) 60. (c) 61. (b) 62. (e) 63. (a) 64. (a) 65. (c) 66. (c) 67. (d) 68. (c) 69. (a) 70. (e) 71. (d) 72. (b) 73. (d) 74. (c) 75. (e) 76. (a) 77. (c) 78. (e) 79. (b) 80. (d) 81. (c) 82. (b) 83. (d) 84. (e) 85. (a) 86. (c) 87. (c) 88. (d) 89. (c) 90. (a) 91. (b) 92. (c) 93. (a) 94. (a) 95. (b) 96. (b) 97. (d) 98. (a) 99. (b) 100. (c) 101. (b) 102. (d) 103. (c) 104. (d) 105. (a) 106. (d) 107. (b) 108. (c) 109. (a) 110. (d) 111. (e) 112. (a) 113. (c) 114. (d) 115. (b) 116. (c) 117. (d) 118. (a) 119. (b) 120. (a) 121. (d) 122. (c) 123. (b) 124. (e) 125. (c) 126. (b) 127. (b) 128. (a) 129. (d) 130. (e) 131. (e) 132. (b) 133. (e) 134. (c) 135. (b) 136. (d) 137. (a) 138. (c) 139. (e) 140. (c) 141. (c) 142. (a) 143. (d) 144. (a) 145. (b) 146. (c) 147. (a) 148. (d) 149. (e) 150. (b) 151. (a) 152. (b) 153. (c) 154. (d) 155. (e) 156. (b) 157. (a) 158. (a) 159. (c) 160. (e) 161. (b) 162. (c) 163. (c) 164. (e) 165. (d) 166. (a) 167. (b) 168. (c) 169. (c) 170. (a) 171. (a) 172. (c) 173. (e) 174. (e) 175. (a) 176. (b) 177. (d) 178. (a) 179. (e) 180. (c) 181. (b) 182. (d) 183. (b) 184. (b) 185. (c) 186. (e) 187. (e) 188. (a) 189. (D) 190. (b) 191. (e) 192. (c) 193. (b) 194. (a) 195. (e) 196. (d) 197. (a) 198. (b) 199. (a) 200. (a) 201. (a) 202. (b) 203. (c) 204. (c) 205. (b) 206. (d) 207. (a) 208. (d) 209. (d) 210. (a) 211. (c) 212. (d) 213. (c) 214. (d) 215. (d) 216. (b) 217. (a) 218. (c) 219. (a) 220. (c) 221. (b) 222. (a) 223. (d) 224. (b) 225. (a) 226. (b) 227. (a) 228. (c) 229. (b) 230. (b) 231. (a) 232. (d) 233. (a) 234. (c) 235. (b) 236. (e) 237. (c) 238. (d) 239. (a) 240. (c) 241. (a) 242. (b) 243. (c) 244. (e) 245. (a) 246. (a) 247. (b) 248. (d) 249. (b) 250. (e)




www.RACEInstitute.in

7601808080 / 9043303030
Chennai | Bengaluru | Chandigarh | Trivandrum | Puducherry

Madurai | Trichy | Salem | Coimbatore | Erode | Namakkal | Tanjore



Yüklə 1,78 Mb.

Dostları ilə paylaş:
1   ...   5   6   7   8   9   10   11   12   13




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©muhaz.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin